Communication method and apparatus for AI network security
USPTO granted Patent US12592960B2 to Huawei Technologies Co., Ltd. on March 31, 2026, for a communication method improving AI network security via anti-attack policies. The patent covers obtaining anti-attack policy information, determining training or inference data based on that information, and using data source blocklists, trustlists, preprocessing methods, or data enhancement techniques to protect AI models in network environments.
Dynamic cloud workload reallocation based on DRAM Rowhammer attacks
USPTO granted Oracle International Corporation Patent US12592962B2 for a system and method of identifying and mitigating memory bit flips in cloud infrastructure. The technology monitors low-level memory space in DRAM instances to detect bit flips, verifies sustained bit flips (potentially Rowhammer attacks) versus transitory errors, and migrates workloads from affected computing instances. Application 18410717 was filed January 11, 2024, with 20 claims granted.
Quantum-based adaptive deep learning framework for securing network files
USPTO granted Bank of America patent US12592961B2 for a quantum-computing based file remediation system using quantum generative adversarial networks (QGAN). The system receives network files, runs deep learning on quantum circuits when file attribute scores deviate from baselines, and generates remediated files. Assignee: Bank of America Corporation.
Security scoring for typographical errors using probabilistic model
USPTO granted patent US12592965B2 to Microsoft Technology Licensing, LLC for a system and method of generating transformation error probabilities to predict typographical errors using a probabilistic graphical model. The patent covers security scoring based on character-by-character transformation analysis of training data containing historical typographical errors.
Network Security Policy Application via Non-Equal Boundary Search Tree
USPTO granted patent US12592970B2 to Fortinet, Inc. covering systems and methods for applying network security policies using a non-equal boundary search tree. The patent, with inventors Frederick Tang and Shushan Wen, contains 22 claims related to network traffic policy enforcement. Application 18208376 was filed June 12, 2023.
Network Access Control Using Risk-Based Versioning
The USPTO granted Patent US12592971B1 to Calix, Inc. covering a method for controlling network access between clients and servers using application software versioning to determine client risk levels. The technology employs different program sets based on risk assessment, using high-security programs for high-risk clients and a combination of high and low-security programs for lower-risk clients, with potential implementation in zero trust network access systems.
Systems for Malicious Website Detection Using Machine Learning
The USPTO granted Patent US12592967B2 to BTblock for systems that detect and prevent navigation to malicious websites using machine learning. The patent covers technology that extracts URLs, compares them against domain name databases of safe and unsafe sites, and uses machine learning models trained on updated databases to enhance detection capabilities. Invented by Thomas Olofsson, the patent contains 20 claims and was filed April 19, 2024 under application number 18641082.
Flexible Deterministic Finite Automata (DFA) Tokenizer for AI-Based Malicious Traffic Detection
The USPTO granted Intel Corporation Patent US12592958B2 for a flexible DFA tokenizer system that enables AI-based malicious traffic detection. The system uses deterministic finite automata to convert input strings into token sequences, extracts features, and classifies network traffic as benign or malicious using machine learning models. The patent includes 20 claims and names 8 inventors.
WideField Security identity posture management patent granted
USPTO granted patent US12592943B2 to WideField Security Inc. covering methods for stitching meta sessions with underlying trails fragmented across distributed sessions. The patent includes 20 claims and covers identity posture management technology using telemetry signal correlation and security policy enforcement. Filing date was September 17, 2024.
Palo Alto Networks two-layer ML malware detector
USPTO granted Palo Alto Networks patent US12592948B2 for a two-layer machine learning malware detection system that classifies network traffic across multiple protocols. The invention correlates network sessions by source indicators and uses protocol-specific first-layer classifiers to improve cross-protocol malware detection accuracy. The patent contains 25 claims covering the ML architecture, classification methods, and system configurations.
Neural Network Intrusion Detection System Patent Grant
The USPTO granted Bank of America Corporation Patent US12592955B2 for a neural network-based network intrusion detection system. The system intercepts and analyzes network requests, grouping suspicious requests by geolocation, evaluates request rates against thresholds, and uses neural networks to classify malicious activity. The patent, with 20 claims, was filed September 22, 2023.
Amazon patent detects abnormal network activity using traffic analysis
USPTO granted Amazon Technologies, Inc. Patent US12592946B1 covering methods for dynamically detecting abnormal network activity through traffic analysis. The system extracts key features from monitored network traffic, aggregates data by dimension (such as region), generates statistical distributions, and applies thresholds to identify anomalous behavior that may indicate malicious activity.
Methods and apparatuses for detecting and localizing faults using machine learning models
USPTO granted patent US12592953B2 to Telefonaktiebolaget LM Ericsson for methods of detecting and localizing network faults using machine learning models. The patent covers pre-processing procedure-level time series data across multiple network nodes for training ML anomaly detection models. The patent contains 17 claims and was filed August 1, 2022.
Netskope patent detects malicious C2 cloud traffic, blocks malware
The USPTO granted Patent US12592959B2 to Netskope, Inc. on March 31, 2026. The patent covers technology for detecting and blocking malicious command and control (C2) cloud traffic by using a network security system that reroutes cloud traffic, analyzes incoming requests, identifies malicious resources, and prevents transmission to those resources while maintaining availability of legitimate resources.
Trust Metadata for Network Packets
The USPTO granted US Patent 12592936B2 to Dell Products L.P. for a method of adding trust metadata to network packets. The invention prepends a data confidence fabric header containing hardware/software metadata to data streams before transmission across a network. The patent includes 20 claims covering methods and systems for establishing packet-level trust verification.
Vehicle cyber attack protection using voltage measurements
The USPTO granted patent US12592937B2 to Marelli Europe S.p.A. for a method and device protecting vehicle communication networks from cyber attacks through voltage measurement analysis. The patent covers detecting malicious nodes by analyzing voltage distributions and cumulative deviations at receiving nodes to identify anomalous network behavior.
Security integration for cloud services
The USPTO granted patent US12592938B2 to Sophos Limited on March 31, 2026, for a threat management facility integrating native enterprise security with cloud service provider threat data. The patent covers authentication to cloud services and mapping data feeds to extend threat detection beyond endpoint-centric techniques.
Networking techniques for enabling communication between multiple cloud environments
The USPTO granted patent US12592931B2 to Oracle International Corporation for techniques enabling private network paths between multiple cloud environments. The patent covers methods for establishing cross-cloud tenancy and secure communication between cloud platforms through shared resources. The patent was granted on March 31, 2026, with 18 claims covering cloud networking methodology.
Role Container Access Management for Privileged Roles in Cloud Environments
USPTO granted Oracle Patent US12592934B2 covering role containers, activation workflows, and access management for privileged roles in private label cloud environments. The patent, assigned to Oracle International Corporation, describes techniques for managing role assignments using workflow-based assignment and activation. The patent contains 24 claims and covers H04L 63/105 and related classifications.
Method and system for integrated process to streamline privileged access management
USPTO granted Patent US12592932B2 to Saudi Arabian Oil Company for a method integrating privileged access management (PAM) systems with self-service portals and workflow automation engines. The 14-claim invention streamlines access elevation requests by enabling policy-based approvals through an automated process. This is an informational patent grant notice with no regulatory compliance requirements.
Risk-Based Access Control Patent for Resource Access Permissions
USPTO granted Capital One Services, LLC Patent US12592933B2 for systems and methods managing resource access permissions using risk-based access control. The patent covers determining risk measures and inserting user identifiers into access control lists based on access level permissions.
Realtek Multi-Link Data Transmission Patent Grant
USPTO granted Realtek Semiconductor Corporation Patent US12592742B2 for a multi-link data transmission method in wireless networking. The patent covers transmitting identical data simultaneously over two separate links and stopping secondary transmission upon receiving a response on the primary link, reducing network redundancy.
Zero-Trust Policy Generation via Application Segmentation
USPTO granted patent US12592930B2 to Zscaler, Inc. covering systems and methods for generating zero-trust access policies through sequence-based application segmentation. The patent describes analyzing user application access log data to identify sequential patterns, grouping applications into app-segments and users into user-groups, and generating access policies accordingly.
Network credential update method for target mobile connections
USPTO granted patent US12593208B2 to Beijing Jingdong Qianshi Technology Co., Ltd. on March 31, 2026, covering a method for updating network credentials in mobile connection systems. The patent describes a process for determining when to send updated credentials to mobile terminals via backup connections and establishing target network connections based on credential matching.
Critical Authentication Bypass Vulnerability in Anritsu Remote Spectrum Monitor
CISA ICS-CERT published advisory ICSA-26-090-01 disclosing CVE-2026-3356, a critical authentication bypass vulnerability (CVSS 9.8) affecting all versions of Anritsu Remote Spectrum Monitor models MS27100A, MS27101A, MS27102A, and MS27103A. The vendor has no plans to remediate the vulnerability, which allows unauthorized network attackers to access and manipulate the device management interface. CISA recommends network isolation and secure deployment practices as mitigation.
Critical Authentication Bypass in PX4 Autopilot MAVLink Protocol
CISA ICS-CERT published advisory ICSA-26-090-02 disclosing CVE-2026-1579, a critical vulnerability (CVSS 9.8) in PX4 Autopilot v1.16.0 affecting the MAVLink communication protocol. The flaw allows unauthenticated remote attackers to execute arbitrary shell commands via the MAVLink interface when message signing is not enabled. CISA and the vendor recommend enabling MAVLink 2.0 message signing on all non-USB communication links as the primary remediation.
Capital One OTP Card Master Key Distribution Enables Independent Cryptogram Generation
USPTO granted Capital One Services, LLC Patent US12592828B2 for a system enabling independent cryptogram generation during OTP card manufacturing and verification. The invention allows personalization HSMs and validation HSMs to independently derive shared secrets without network communication, decoupling the card personalization and validation workflows. The patent lists 20 claims covering the cryptographic key distribution method.
Access control method based on zero-trust security, device, and storage medium
The USPTO granted Patent US12592829B2 to Tencent Cloud Computing (Beijing) Co., Ltd covering a zero-trust access control method with cryptographic identity validation. The patent contains 20 claims and was filed on March 20, 2023. Inventors include Lianying Wang, Chuanda Ding, and Yang Yu.
AI Agent Routing via Semantic Fingerprinting and Bloom Filters
The USPTO granted Patent US12591793B2 to Citibank, N.A. covering a hierarchical semantic fingerprinting system for AI agent routing that uses locality-sensitive hash functions and bloom filter cascades. The patent discloses methods for matching queries to appropriate AI agents by comparing semantic fingerprints.
GNU libc Denial of Service Vulnerability
CERT-Bund issued advisory WID-SEC-2026-0918 warning of a denial of service vulnerability in GNU libc versions up to 2.43 (CVSS 7.5). The vulnerability allows remote anonymous attackers to cause service disruption. Mitigation measures are available.
MongoDB DoS Vulnerability Advisory - CVSS 5.3
CERT-Bund issued security advisory WID-SEC-2026-0920 disclosing a denial of service vulnerability in MongoDB with CVSS Base Score 5.3 (medium) and Temporal Score 4.6 (medium). The vulnerability affects MongoDB versions prior to 8.3.0-rc0, 8.2.2, 8.0.18, and 7.0.31 across Linux, UNIX, and Windows platforms. A remote, authenticated attacker can exploit this flaw to conduct a DoS attack; mitigations are available.
Symantec Data Loss Prevention Privilege Escalation Vulnerability
CERT-Bund issued security advisory WID-SEC-2026-0921 warning of a local privilege escalation vulnerability in Symantec Data Loss Prevention products. The vulnerability carries a CVSS Base Score of 7.8 (high). Affected versions include DLP releases prior to 16.0 RU1 MP1 HF12, 16.0 RU2 HF9, 16.1 MP2, 25.1 MP1, and 16.0 MP2 HF15. Mitigations are available.
Apache Airflow Security Bypass Vulnerability
CERT-Bund issued advisory WID-SEC-2026-0916 identifying a security vulnerability in Apache Airflow Provider for Databricks (versions prior to 1.12.0) that allows attackers to bypass security controls. The vulnerability has a CVSS Base Score of 7.3 (high) and supports remote attack vectors. Organizations using affected versions should update immediately to version 1.12.0 or later.
IBM App Connect Enterprise Multiple DoS Vulnerabilities
CERT-Bund issued a security advisory (WID-SEC-2026-0903) disclosing multiple denial-of-service vulnerabilities in IBM App Connect Enterprise with a CVSS Base Score of 7.5 (high) and Temporal Score of 6.5 (medium). Affected versions are those prior to 12.0.12.24 and 13.0.7.0. Remote, unauthenticated attackers can exploit these vulnerabilities to conduct DoS attacks against affected installations.
Kyocera Printer Critical Vulnerabilities CVSS 9.8 Remote Attack
CERT-Bund issued security advisory WID-SEC-2026-0915 alerting to multiple critical vulnerabilities in Kyocera TASKalfa and ECOSYS printers. The vulnerabilities carry a CVSS Base Score of 9.8 (critical) and enable remote attacks without user interaction. Organizations using affected Kyocera printers should apply available mitigations immediately.
IBM DataPower Gateway Multiple Vulnerabilities Allow DoS and Data Manipulation
CERT-Bund issued security advisory WID-SEC-2026-0924 disclosing multiple vulnerabilities in IBM DataPower Gateway with CVSS Base Score 6.5 (medium) and CVSS Temporal Score 5.7 (medium). Affected versions include DataPower Gateway prior to 11.0.0.0, 10.6.0.9, 10.6.6.0, and 10.5.0.21. Remote attackers can exploit these flaws to conduct denial of service attacks and manipulate data. Mitigation measures are available.
ICE Arrests Canadian Top-25 Most Wanted Fugitive in Mississippi
ICE arrested Adrian Vincent Walker, a Canadian national and top-25 most-wanted fugitive, at a residence in Tupelo, Mississippi on March 23, 2026. Walker is wanted by Toronto Police Service for first-degree murder and attempted murder following a May 2024 shooting. He faces federal charges for illegal entry and illegal possession of a firearm.
ICE Arrests Criminals for Sexual Assault, Kidnapping, Weapons
ICE announced arrests of criminal aliens convicted of aggravated sexual assault of a child, aggravated kidnapping, and assault with a deadly weapon. The enforcement action targets individuals who pose public safety threats under the current administration.
Multiple Vulnerabilities in Microsoft Products
CERT-FR issued a security advisory (CERTFR-2026-AVI-0381) detailing 5 CVEs affecting Microsoft products and related open-source libraries. The vulnerabilities impact azl3 python-requests, cbl2 kernel, cbl2 libpng, and cbl2 plexus-utils. Organizations using these components should consult Microsoft security bulletins and apply available patches.
FoxIT PDF Editor and Reader Multiple Vulnerabilities
CERT-FR published an advisory warning of 7 multiple vulnerabilities (CVE-2026-3774 through CVE-2026-3780) in FoxIT PDF Editor and Reader software. These vulnerabilities affect Windows and Mac versions prior to 13.2.3, 14.0.3, and 2026.1. Exploitation risks include arbitrary code execution, privilege escalation, data confidentiality breach, and denial of service. Organizations using affected products should update immediately.
Symantec DLP Privilege Escalation Vulnerability
CERT-FR published a security advisory warning of a privilege escalation vulnerability (CVE-2026-3991) in Symantec Data Loss Prevention affecting five version branches: 16.0 MP2, 16.0 RU1 MP1, 16.0 RU2, 16.1 MP2, and 25.1 MP1. Broadcom released security bulletin 37306 with patches. Organizations using affected versions should update immediately.
Papercut Vulnerabilities Expose Data Confidentiality, Enable Remote XSS
CERT-FR issued a security advisory warning of multiple vulnerabilities in Papercut MF and NG (versions prior to 25.0.10). The flaws enable data confidentiality breaches and remote indirect cross-site scripting (XSS) attacks. Organizations running affected Papercut versions should update to 25.0.10 immediately to mitigate exploitation risk.
Elastic OpenTelemetry Java Remote Code Execution Vulnerability
CERT-FR issued a security advisory warning of a critical remote code execution vulnerability (CVE-2026-33701) in Elastic OpenTelemetry Java affecting versions prior to 1.10.0. The vulnerability allows remote attackers to execute arbitrary code on affected systems. Organizations using the affected software should apply the vendor patch immediately.
Multiple Edge Vulnerabilities Prior to 146.0.3856.84
CERT-FR issued an advisory alerting that multiple unspecified vulnerabilities were discovered in Microsoft Edge affecting versions prior to 146.0.3856.84. The vulnerabilities could allow an attacker to cause an unspecified security issue. Two CVEs are referenced: CVE-2026-4676 and CVE-2026-4678. Users are advised to update to the patched version.
Secure data parser method and system
The USPTO granted Patent US12591698B2 to Security First Innovations, LLC for a secure data parser method and system that parses data and splits it into multiple portions for secure storage and communication. The technology may employ encryption and protects data in motion by distributing data across multiple communication paths. The patent contains 20 claims.
Systems and methods of protecting secrets in use with containerized applications
The USPTO granted Visa International Service Association Patent No. US12591655B2 for systems and methods protecting cryptographic keys and sensitive data in containerized applications. The invention describes a key protection service implemented as a lightweight virtual machine with containerized processes and attestation clients for secured key storage.
libarchive Remote Code Execution Vulnerability
CERT-Bund issued Security Advisory WID-SEC-2026-0923 warning of a high-severity remote code execution vulnerability in libarchive, a C library used for reading and creating archive formats including tar, cpio, zip, and ISO. The vulnerability has a CVSS Base Score of 7.3 and affects systems running Linux, UNIX, and Windows. Organizations using libarchive should apply available mitigations immediately.
Asterisk security advisory, XSS, root code execution
Asterisk security advisory, XSS, root code execution
Docker Desktop Model Runner SSRF Vulnerability Advisory
CERT-Bund issued a security advisory regarding a Server-Side Request Forgery (SSRF) vulnerability in Docker Desktop Model Runner (versions prior to 1.1.25) and Docker Desktop (versions prior to 4.67.0). The vulnerability carries a CVSS Base Score of 7.4 (high) and allows remote anonymous attackers to disclose confidential information.
ESET PROTECT Vulnerability Allows Adjacent Network Information Disclosure
CERT-Bund issued a security advisory regarding an unpatched vulnerability in ESET PROTECT on-prem (advisory WID-SEC-2026-0926). The flaw, with CVSS Base Score 4.3 (medium) and Temporal Score 4.0 (medium), allows remote attackers from adjacent networks to disclose information. No vendor mitigation is currently available.
IBM Semeru Runtime Critical Vulnerability - Arbitrary Code Execution
CERT-Bund issued a critical security advisory (WID-SEC-2026-0929) warning of a vulnerability in IBM Semeru Runtime and IBM DB2. The vulnerability has a CVSS Base Score of 9.8 (critical) and CVSS Temporal Score of 8.5 (high). A remote, anonymous attacker can exploit this flaw to execute arbitrary code. Affected versions: IBM Semeru Runtime prior to 21.0.10.0 and IBM DB2 version 12.1.4. Mitigation measures are available.
Checkmk Critical XSS Vulnerabilities
CERT-Bund issued a critical security advisory (WID-SEC-2026-0928) regarding multiple Cross-Site Scripting (XSS) vulnerabilities in Checkmk IT monitoring software. The vulnerabilities affect versions prior to 2.6.0b1 and 2.5.0b2, with a CVSS Base Score of 9.0 (critical). Organizations running affected Checkmk deployments should apply mitigations immediately.
NoMachine Remote Desktop Privilege Escalation Vulnerabilities
CERT-Bund issued security advisory WID-SEC-2026-0927 identifying multiple vulnerabilities in NoMachine remote desktop software (versions prior to 9.4.14) with CVSS Base Score 7.8 (high). Attackers can exploit these vulnerabilities to manipulate files and escalate privileges. Organizations using NoMachine should apply available patches.
Synacor Zimbra vulnerability bypasses security, manipulates data
Synacor Zimbra vulnerability bypasses security, manipulates data
Biometric authentication template update system
USPTO granted Patent No. US12591648B2 to NEC Corporation covering a biometric authentication system that updates biometric templates without requiring user re-registration. The patent includes an update value generation unit that synchronizes updates to both biometric templates and associated verification keys. The patent contains 13 claims and covers CPC classifications G06F 21/32 and H04L 9/32.
OpenClaw vulnerabilities, CVSS 9.8 critical, 30th Mar
OpenClaw vulnerabilities, CVSS 9.8 critical, 30th Mar
nginx-ui Critical Remote Code Execution Vulnerabilities
CERT-Bund issued security advisory WID-SEC-2026-0931 warning of critical vulnerabilities in nginx-ui versions below 2.3.4. Multiple CVSS 9.8-rated flaws allow remote, authenticated attackers to execute arbitrary code, gain administrator privileges, manipulate data, bypass security controls, or cause denial-of-service conditions. Organizations running affected nginx-ui deployments should update to version 2.3.4 or later immediately.
PowerDNS Multiple Vulnerabilities - Remote Code Execution Risk
CERT-Bund issued security advisory WID-SEC-2026-0932 disclosing multiple vulnerabilities in PowerDNS DNS server software affecting versions prior to 1.9.12 and 2.0.3. The vulnerabilities carry a CVSS Base Score of 8.1 (high) and a Temporal Score of 7.1, enabling remote attackers to execute code, cause denial of service, disclose information, and bypass security controls. Organizations running affected PowerDNS installations on Linux, UNIX, Windows, or other platforms should apply available mitigations or updates immediately.
IBM App Connect Enterprise Critical Vulnerabilities CVSS 9.8
CERT-Bund issued security advisory WID-SEC-2026-0933 disclosing multiple critical vulnerabilities in IBM App Connect Enterprise affecting versions prior to 13.0.7.0. The vulnerabilities carry a CVSS Base Score of 9.8 (critical) and CVSS Temporal Score of 8.5 (high), with remote attack capability confirmed. Organizations using this software should apply mitigations immediately.
Foxit PDF Editor/Reader Multiple Vulnerabilities CVSS 7.8
CERT-Bund issued a security advisory (WID-SEC-2026-0934) disclosing multiple vulnerabilities in Foxit PDF Editor and Reader affecting Windows, Linux, and UNIX systems prior to version 2026.1. The vulnerabilities carry a CVSS Base Score of 7.8 (high), potentially enabling information disclosure, denial of service, and code execution attacks. Users are advised to update to version 2026.1 to mitigate the risks.
IBM patent for entity-wide database asset index generation
USPTO granted patent US12591704B2 to International Business Machines Corporation for entity-wide database asset index generation methods. The patent covers technology for identifying database instances across multiple security monitoring systems and linking same instances observed by different systems to detect database security threats. The patent includes 20 claims and names inventors Oded Sofer, Aviv Ron, and Shachaf Katz.
Systems and Methods for Dynamically Anonymizing Geospatial Data for Secure Analytics
USPTO granted Patent US12591709B2 to Anonos Innovations LLC on March 31, 2026. The patent covers systems and methods for dynamically anonymizing geospatial data, enabling data subjects to remain anonymous for desired periods and to desired degrees while facilitating privacy-preserving analytics, AI, and machine learning applications.
Cyber Risk Monte Carlo Simulation Patent for Financial Loss Characterization
USPTO granted patent US12591753B2 to Zscaler, Inc. on March 31, 2026. The patent covers systems and methods for analyzing cybersecurity monitoring data to determine financial risk using Monte Carlo simulation to characterize potential losses from cyber events. The simulation inputs are based on the organization's industry, size, and current cyber risk posture.
Testing functionality of and generating on-chain programs
The USPTO granted Citibank Patent US12591501B1 on March 31, 2026, covering systems and methods for testing and generating on-chain blockchain programs. The patent includes 18 claims and describes functionality for generating on-chain program code by determining models, retrieving functions, and determining blockchain operations with parameters. The system also tests on-chain programs by installing them on a test blockchain and generating operations for cryptography-based storage applications.
Zero Touch Provisioning of Bare Metal Servers with Radio Access Network Software
USPTO granted Patent US12591437B2 to Rakuten Symphony, Inc. for systems and methods of zero touch provisioning of bare metal servers to run radio access network (RAN) software. The patent covers network boot program delivery in preboot execution environment, registration with data center automation platform, and instantiation of RAN applications. The patent contains 19 claims and names Sree Nandan Atur and Ravi Kumar Alluboyina as inventors.
Network Controlling Device for Radiofrequency Sensing
USPTO granted Patent US12591055B2 to Signify Holding B.V. for a network controlling device that improves radiofrequency sensing reliability by dynamically defining new sensing areas when detection results are potentially unreliable. The patent covers 14 claims and is assigned to CPC classifications including H04W 4/38 and H04L 63/1416.
Deepfake Music Detection Apparatus Using AI Classification
The USPTO published patent application US20260087313A1 for BRAINDECK INC. on March 26, 2026, covering an AI-based apparatus and method for detecting deepfake music. The system analyzes audio features, voice separation probability, and neural vocoder usage to determine whether audio content is synthetically generated. Application No. 18929273 was filed on October 28, 2024.
Quantum-Capacitance Simulation Using Gaussian Subspace Aggregation
The USPTO published Microsoft Technology Licensing's patent application US20260087390A1 for a quantum-capacitance simulation method using Gaussian-subspace aggregation. The method constructs and projects non-interacting Hamiltonians for material configurations, then uses sums-of-Gaussians procedures to approximate low-energy eigenstates under interacting Hamiltonians. Inventors are Samuel Boutin and Roman Bela Bauer.
Fault Tolerant Quantum Computation via Logical Operators Measurement
USPTO published patent application US20260087389A1 by inventors Theodore James Yoder and Dominic Williamson disclosing systems and methods for low-overhead fault-tolerant quantum computation via measurement of logical operators. The invention utilizes a graph selection component to select an auxiliary graph and a measurement component to execute a deformed quantum stabilizer code on a quantum system. This patent has applications in quantum computing hardware and software development.
Transactional Neural Reasoning AI (TNRAI) Patent Application
USPTO published patent application US20260087387A1 for Transactional Neural Reasoning AI (TNRAI), a novel AI system designed for complex decision-making. The application describes a five-pillar architecture including delta-path modeling, skew-based adversarial recognition, vector memory recall, ambient reasoning overlays, and a multi-logic arbitration engine. Filed by inventor Joshua B. Williamson under application number 19171498.
Data Reconstruction Using Machine-Learning Predictive Coding
USPTO published patent application US20260087314A1 for a machine-learning method that reconstructs data samples in a time series using predictive coding. The method generates reconstructed versions of first and second data samples, then uses a neural network to predict intermediate data samples positioned between them. The application (No. 19107781) was filed July 27, 2023 and published March 26, 2026.
Controlling Agents Using Ambiguity-Sensitive Neural Networks and Risk-Sensitive Neural Networks
USPTO published patent application US20260087311A1 for methods controlling AI agents using ambiguity-sensitive and risk-sensitive neural networks. The application covers action selection systems for agent control with four named inventors. Patent application was filed September 8, 2023, and published March 26, 2026.
Combined Deep Learning Inference and Compression Using Sensed Data
USPTO published patent application US20260087312A1 for a device and method combining deep learning inference with data compression using sensed data. The system encodes sensed data locally, transmits it in batches to a remote computing system, and receives optimized encoder and prediction models in return. Inventors: Damian Kelly, Megan O'Brien, Gregory Buckley, Colleen B. Caveney.
Vehicular crime mitigation system using blockchain and cryptography
USPTO granted US Patent 12589712B2 to JGR Software Group LLC on March 31, 2026, covering a vehicular crime mitigation system that uses blockchain and cryptography. The patent describes technologies for monitoring vehicles, detecting anomalous activity, and recording trip information on a blockchain.
Function selection in industrial networks
USPTO granted patent US12591222B2 to Cisco Technology, Inc. covering methods for selecting 5G user plane functions in industrial networks based on hierarchical security model layers. The patent, filed April 24, 2023, includes 20 claims related to associating 5G functions with contextual security information and directing endpoint communications accordingly.
Anomaly detection and protection
The USPTO granted Patent US12591002B2 to ZERO-ERROR SYSTEMS PTE. LTD. covering an apparatus and method for detecting anomalies in electronic systems with integrated circuits. The patent describes sensing current and voltage characteristics of supply rails to identify anomalies and enable removal or mitigation. The patent contains 19 claims and has 4 named inventors.
Secure Federated Learning System for Healthcare Data Management with Privacy Preservation
USPTO published patent application US20260087167A1 for a secure federated learning system enabling healthcare institutions to train machine learning models locally on sensitive data without transferring raw information. The system incorporates AES and RSA encryption, secure aggregation, differential privacy protocols, and automated HIPAA and GDPR compliance monitoring. Filing date was February 14, 2025.
Microsoft patent guards multimodal AI from malicious prompt attacks
Microsoft patent guards multimodal AI from malicious prompt attacks
Single Trajectory Policy Optimization for Generative Machine Learning Models
The USPTO published patent application US20260087409A1 for 'Single Trajectory Policy Optimization for Generative Machine Learning Models' filed by 14 inventors. The application covers methods for training generative ML models by optimizing an objective function based on likelihoods and quality scores of generated data items. Patent applications are informational publications and do not impose regulatory obligations.
Meta-learning with Diverse Tasks for Few-Shot Learning
USPTO published patent application US20260087412A1 by inventors Cresswell et al. covering methods for improving meta-learning models for few-shot learning of unseen tasks through improved task diversity scoring and generation of diverse training tasks using unsupervised analysis of disentangled latent features. Patent applications represent informational publications without creating immediate compliance obligations for third parties.
Federated Learning with Backbone Decoder Models
USPTO published patent application US20260087416A1 by Sony Group Corporation covering apparatus and methods for federated learning using a backbone-decoder model architecture. The invention enables servers to distribute decoder components to edge devices for localized training while maintaining backbone model parameters centrally, with aggregated decoder updates returned to the server for model refinement.
Personal AI agent creation for computing device actions
USPTO published patent application US20260087384A1 for personal AI agent technology enabling automated computing device actions through LLM-based prompts and asynchronous data retrieval. Inventors: Jiachen Yang, Chih-Lun Lee, Hao Liu, Ang Li. Filing date: September 24, 2025.
Citrix NetScaler CVE-2026-3055 Critical Memory Overread Vulnerability
CISA added CVE-2026-3055 to the Known Exploited Vulnerabilities catalog. This critical memory overread vulnerability (CVSS 9.3) affects Citrix NetScaler ADC and Gateway when configured as SAML IDP. Affected versions include 14.1 before 66.59 and 13.1 before 62.23. CISA confirms active exploitation with automatable attack capability and total system impact potential.
AI evaluates threaded connections using torque, rotation measurements
USPTO published patent application US20260087405A1 for a method and apparatus using artificial intelligence to evaluate threaded connections based on torque and rotation measurements. The invention involves two AI systems where model parameters can be transmitted between them, enabling quality prediction even when the systems are not in communication. Inventors: Rainer RUEHMANN, Benjamin SACHTLEBEN, David GEISSLER.
Training Machine-Learned Models with Temporal Conditioning for Time-Aware Inference
USPTO published patent application US20260087404A1 for a method of training machine-learned models with temporal conditioning to enable time-aware inference. The application, filed by Florian Nils Hartmann and Matthew Sharifi, covers extracting temporal features from source data to construct training inputs and generate content predictions using computed loss functions. CPC classification is G06N 20/00 (Machine Learning).
Error robust quantum compiler, 6 inventors, March 2026
Error robust quantum compiler, 6 inventors, March 2026
ICE Agents Under Attack During Arrest of Criminal Illegal Alien in Sacramento
DHS announced that ICE law enforcement officers were attacked on March 25, 2026, during a targeted vehicle stop to arrest Xa Lee, a criminal illegal alien from Laos with multiple prior convictions including vehicle theft, felony firearm possession, and two DUIs. Lee struck an ICE officer with his vehicle during the encounter, deployed tasers, and fled the scene; he remains at-large. DHS noted a reported 3,200% increase in vehicular attacks against ICE agents.
ICE Arrests MS-13, Child Predators, Rapists, and Drug Traffickers Over Weekend
DHS announced that ICE officers conducted multiple arrests over the weekend of March 28-29, 2026, targeting criminal illegal aliens including an MS-13 gang member from El Salvador and individuals convicted of aggravated sexual battery of a child, manslaughter, rape, and drug trafficking. The announcement highlights continued enforcement under the Trump administration targeting public safety threats.
Santa Clara Officials Refuse ICE Detainers for Honduran Murder Suspects
DHS issued a press release documenting how Santa Clara County sanctuary officials refused to honor ICE detainers for two Honduran nationals—Franquin Inestroza-Martinez (wanted for a New Jersey murder) and Gerzon Jose Chirinos-Munguia—subsequently released and accused of murdering a 24-year-old single mother in Sunnyvale, California. The release highlights ongoing federal-local tensions over sanctuary policies and ICE detainer compliance.
Vernon Baker sentenced 25 months for in-flight sexual assault
Vernon Baker, 41, of Linden, New Jersey, was sentenced to 25 months' imprisonment and one year supervised release by U.S. District Judge Anita B. Brody for sexually assaulting a female passenger seated next to him on a flight from Los Angeles to Philadelphia on October 30, 2024. The case was investigated by the FBI, Federal Air Marshal Service, and Philadelphia Police Department and prosecuted by the U.S. Attorney's Office Eastern District of Pennsylvania.